Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 9, 2024
1 parent 5753879 commit e0bcd51
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -138,3 +138,13 @@ a3275366f3f35644495e7ba699e0a5d1
d51d65652855e96deb68fe2df0ffc5b6
57af9e12164af0b0f259681d4ca0ae46
d86485db1126f8b6a9da171925e377ec
4b0e3d6ba62b645859b02ee236ddfed6
7cc2ce445eee380aeefafd320d6e36ea
66a0e0f0247a580c96ef0720c2b26e75
b49ccbb7dc60d5a40c114eb8d749f97a
8cb5affd02ee85bee6e92671e1d7ba96
7d2929795cca282b8d51ff29d04e323e
f53bb28287e6047e747a03d247e65973
e118c55d332902b96be360221d288ebe
a527326d291d1c4543a041fe01037b2a
a3cd5d3170d5bb34afedb2701802eded
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-10-09 09:26:14 -->
<!-- RELEASE TIME : 2024-10-09 21:21:52 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>4b0e3d6ba62b645859b02ee236ddfed6</td>
<td>CVE-2024-9675</td>
<td>2024-10-09 15:15:17 <img src="imgs/new.gif" /></td>
<td>A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9675">详情</a></td>
</tr>

<tr>
<td>7cc2ce445eee380aeefafd320d6e36ea</td>
<td>CVE-2024-9671</td>
<td>2024-10-09 15:15:17 <img src="imgs/new.gif" /></td>
<td>A vulnerability was found in 3Scale. There is no auth mechanism to see a PDF invoice of a Developer user if the URL is known. Anyone can see the invoice if the URL is known or guessed.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9671">详情</a></td>
</tr>

<tr>
<td>66a0e0f0247a580c96ef0720c2b26e75</td>
<td>CVE-2024-8048</td>
<td>2024-10-09 15:15:17 <img src="imgs/new.gif" /></td>
<td>In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8048">详情</a></td>
</tr>

<tr>
<td>b49ccbb7dc60d5a40c114eb8d749f97a</td>
<td>CVE-2024-8015</td>
<td>2024-10-09 15:15:17 <img src="imgs/new.gif" /></td>
<td>In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8015">详情</a></td>
</tr>

<tr>
<td>8cb5affd02ee85bee6e92671e1d7ba96</td>
<td>CVE-2024-8014</td>
<td>2024-10-09 15:15:16 <img src="imgs/new.gif" /></td>
<td>In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8014">详情</a></td>
</tr>

<tr>
<td>7d2929795cca282b8d51ff29d04e323e</td>
<td>CVE-2024-7840</td>
<td>2024-10-09 15:15:16 <img src="imgs/new.gif" /></td>
<td>In Progress Telerik Reporting versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-7840">详情</a></td>
</tr>

<tr>
<td>f53bb28287e6047e747a03d247e65973</td>
<td>CVE-2024-7294</td>
<td>2024-10-09 15:15:16 <img src="imgs/new.gif" /></td>
<td>In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-7294">详情</a></td>
</tr>

<tr>
<td>e118c55d332902b96be360221d288ebe</td>
<td>CVE-2024-7293</td>
<td>2024-10-09 15:15:16 <img src="imgs/new.gif" /></td>
<td>In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-7293">详情</a></td>
</tr>

<tr>
<td>a527326d291d1c4543a041fe01037b2a</td>
<td>CVE-2024-7292</td>
<td>2024-10-09 15:15:15 <img src="imgs/new.gif" /></td>
<td>In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-7292">详情</a></td>
</tr>

<tr>
<td>a3cd5d3170d5bb34afedb2701802eded</td>
<td>CVE-2024-47673</td>
<td>2024-10-09 15:15:15 <img src="imgs/new.gif" /></td>
<td>In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped Not doing so will make us send a host command to the transport while the firmware is not alive, which will trigger a WARNING. bad state = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] Call Trace: <TASK> iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm] iwl_mvm_config_scan+0x198/0x260 [iwlmvm] iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm] iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm] process_one_work+0x29e/0x640 worker_thread+0x2df/0x690 ? rescuer_thread+0x540/0x540 kthread+0x192/0x1e0 ? set_kthread_struct+0x90/0x90 ret_from_fork+0x22/0x30</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-47673">详情</a></td>
</tr>

<tr>
<td>334b667b7f88ce6feb4321216cb40c5f</td>
<td>CVE-2024-45880</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-45282">详情</a></td>
</tr>

<tr>
<td>9780c53f505ca0e5e0bc99eed3f6b600</td>
<td>CVE-2024-20103</td>
<td>2024-10-07 03:15:03</td>
<td>In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001358; Issue ID: MSV-1599.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20103">详情</a></td>
</tr>

<tr>
<td>0d85c4bcac1a9eeb82904d263acdf665</td>
<td>CVE-2024-20102</td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20102">详情</a></td>
</tr>

<tr>
<td>daf82040e23ff87537f161b991c86201</td>
<td>CVE-2024-20101</td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20101">详情</a></td>
</tr>

<tr>
<td>992ee153e21872cd5ad109107582b604</td>
<td>CVE-2024-20100</td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20100">详情</a></td>
</tr>

<tr>
<td>c10f9e23cd2bcbd805a5fe697e49ac06</td>
<td>CVE-2024-20099</td>
<td>2024-10-07 03:15:03</td>
<td>In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08997492; Issue ID: MSV-1625.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20099">详情</a></td>
</tr>

<tr>
<td>ce0042f4852c30ebcff63903d5f86e51</td>
<td>CVE-2024-20098</td>
<td>2024-10-07 03:15:03</td>
<td>In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20098">详情</a></td>
</tr>

<tr>
<td>0f2105eb619a182af0ab75ab538ac980</td>
<td>CVE-2024-20097</td>
<td>2024-10-07 03:15:03</td>
<td>In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20097">详情</a></td>
</tr>

<tr>
<td>f213a7eafbc34b7a0479cdf22b58ba51</td>
<td>CVE-2024-20096</td>
<td>2024-10-07 03:15:02</td>
<td>In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1635.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20096">详情</a></td>
</tr>

<tr>
<td>c5053ea29c150e47d4e6f1a23dac434f</td>
<td>CVE-2024-20095</td>
<td>2024-10-07 03:15:02</td>
<td>In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1636.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20095">详情</a></td>
</tr>

<tr>
<td>4065b5d528846523e63695068a59a322</td>
<td>CVE-2024-20094</td>
<td>2024-10-07 03:15:02</td>
<td>In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00843282; Issue ID: MSV-1535.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20094">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit e0bcd51

Please sign in to comment.